Sciweavers

46 search results - page 6 / 10
» Intruder Theories (Ongoing Work)
Sort
View
TPHOL
2008
IEEE
14 years 1 months ago
The Isabelle Framework
g to the well-known “LCF approach” of secure inferences as abstract datatype constructors in ML [16]; explicit proof terms are also available [8]. Isabelle/Isar provides sophis...
Makarius Wenzel, Lawrence C. Paulson, Tobias Nipko...
HICSS
2008
IEEE
130views Biometrics» more  HICSS 2008»
14 years 1 months ago
An Interview Protocol for Discovering and Assessing Collaboration Engineering Opportunities
Collaboration Engineering (CE) projects can run for months and can require substantial expenditures of effort and resources. CE is an approach to designing collaborative work prac...
Robert O. Briggs, Alanah J. Davis, John D. Murphy
WWW
2002
ACM
14 years 7 months ago
Clustering for opportunistic communication
We describe ongoing work on I2I, a system aimed at fostering opportunistic communication among users viewing or manipulating content on the Web and in productivity applications. U...
Jay Budzik, Shannon Bradshaw, Xiaobin Fu, Kristian...
WWW
2005
ACM
14 years 8 days ago
An economic model of the worldwide web
: We believe that much novel insight into the worldwide web can be obtained from taking into account the important fact that it is created, used, and run by selfish optimizing agen...
Georgios Kouroupas, Elias Koutsoupias, Christos H....
IPPS
1999
IEEE
13 years 11 months ago
A Structured Approach to Parallel Programming: Methodology and Models
Parallel programming continues to be difficult, despite substantial and ongoing research aimed at making it tractable. Especially dismaying is the gulf between theory and the pract...
Berna L. Massingill